How To Use Dmitry- Kali Linux- Information Gathering Tool.

Howdy crackers! you all know hacking a system without knowing and understanding it is impossible. In this case, we need to gather information about the system as much as possible to understand the system, to find vulnerabilities available in the system, and to hack into it.

That is why, to make these things easier, hackers, pen-testers, developers created a set of tools, some of which are available in the Kali Linux Operating system.

Here in this article, we’re gonna cover a manual of the Dmitry tool that you will find at the first in the section of Information Gathering tools in Kali Linux.

Who is DMitry?

DMitry sounds like a mafia of Russia. Isn’t it? that’s funny. But in reality, Dmitry is a powerful tool used by hackers, pen-testers, and other people to gather information about online systems, websites, web tools, and many more.
DMItry is coded by James Greig. It is an open-source project, which means that you can download it for free and also you can develop it. DMitry has the ability to perform TCP port scan on host targets, search subdomain on a target host, whois lookup, E-mail address search on target hosts. It also allows users to specify modules according to them.


you can run Dmitry without specifying any options at the command line rather than just putting the target hostname or IP address. If you run it this way, it’ll run with the by default commands.
So it is preferred to specify the options you want to use at the command line so that you have more control over the output.
Let’s have a look at the tutorial on how to use it.

How to Use DMitry in Kali Linux

Fire up your Kali Linux machine, open the terminal, type dmitry, and hit enter. It will load Dmitry on the terminal.
Dmitry- Kali Linux- crackitdown
The start page is opened up and showing the parameters we can use. You can use the man dmitry command to know more about the tool and to see some examples of how to use it.
Do not use the tool if you don’t have the permission to use the tool against the site you want to scan. Because in some places running port scan considered to be illegal. Make sure you’ve checked the law about port scanning of your local area.
We’ve created a text file named Dmitry-info.txt on the Desktop and where all results will be saved.
Whois lookup: To perform  whois lookup against a domain  we are using the  command
dmitry –wnse -o dmitry-info.txt domain name

Replace the dmitry-info.txt with your text file and the domain name with your target domain name and hit enter. It is showing up all the information of the domain including the subdomains, registrar company, IP address etc.

Port scan: Now we will scan to find open ports and to get all possible information about the ports. Use the command

dmitry –pb -o dmitry-info.txt target IP Address

Replace the target IP address with your target IP address. The tool will start TCP port scanning and the results will be saved in a text file. This parameter of Dmitry is not so good in comparison with Nmap but still good to start.

Here, we are using the options as a set together where-

w and n perform whois lookups on target address.

s is used to search subdomains on the target domain.
e is used to look at the email address of the host.
o sets where the output results will be saved.
p performs a port scan.
b looks at the banners of the scanned ports.


Dmitry doesn’t offer a lot of stuff in comparison with today’s advanced information-gathering tools but a few years ago it was really a great tool.
If you look at the strings of Dmitry, you will found it uses to scan ports. It will be better to use updated and current tools that do better jobs in information gathering.